Please share your thoughts on this book with others by leaving a review on the site that you bought it from. If you purchased the book from Amazon, please leave us an honest review on this book's Amazon page. This is vital so that other potential readers can see and use your unbiased opinion to make purchasing decisions, we can understand what our customers think about our products, and our authors can see your feedback on the title that they have worked with Packt to create. It will only take a few minutes of your time, but is valuable to other potential customers, our authors, and Packt. Thank you!

Mastering Identity and Access Management with Microsoft Azure
By :

Mastering Identity and Access Management with Microsoft Azure
By:
Overview of this book
Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively.
You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (21 chapters)
Preface
Section 1: Identity Management and Synchronization
Building and Managing Azure Active Directory
Understanding Identity Synchronization
Exploring Advanced Synchronization Concepts
Monitoring Your Identity Bridge
Configuring and Managing Identity Protection
Section 2: Authentication and Application Publishing
Managing Authentication Protocols
Deploying Solutions on Azure AD and ADFS
Using the Azure AD App Proxy and the Web Application Proxy
Deploying Additional Applications on Azure AD
Exploring Azure AD Identity Services
Creating Identity Life Cycle Management in Azure
Section 3: Data Classification and Information Protection
Creating a Security Culture
Identifying and Detecting Sensitive Data
Understanding Encryption Key Management Strategies
Configuring Azure Information Protection Solutions
Azure Information Protection Development
Other Books You May Enjoy
How would like to rate this book
Customer Reviews